rhsa-2023_6474
Vulnerability from csaf_redhat
Published
2023-11-07 08:52
Modified
2024-11-14 00:14
Summary
Red Hat Security Advisory: podman security, bug fix, and enhancement update

Notes

Topic
An update for podman is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes. Security Fix(es): * golang: html/template: improper handling of JavaScript whitespace (CVE-2023-24540) * net/http, golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding (CVE-2022-41723) * golang: crypto/tls: large handshake records may cause panics (CVE-2022-41724) * golang: net/http, mime/multipart: denial of service from excessive resource consumption (CVE-2022-41725) * golang.org/x/net/html: Cross site scripting (CVE-2023-3978) * golang: net/http, net/textproto: denial of service from excessive memory allocation (CVE-2023-24534) * golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption (CVE-2023-24536) * golang: go/parser: Infinite loop in parsing (CVE-2023-24537) * golang: html/template: backticks not treated as string delimiters (CVE-2023-24538) * golang: html/template: improper sanitization of CSS values (CVE-2023-24539) * containerd: Supplementary groups are not set up properly (CVE-2023-25173) * golang: html/template: improper handling of empty HTML attributes (CVE-2023-29400) * golang: net/http: insufficient sanitization of Host header (CVE-2023-29406) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.3 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for podman is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.\n\nSecurity Fix(es):\n\n* golang: html/template: improper handling of JavaScript whitespace (CVE-2023-24540)\n\n* net/http, golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding (CVE-2022-41723)\n\n* golang: crypto/tls: large handshake records may cause panics (CVE-2022-41724)\n\n* golang: net/http, mime/multipart: denial of service from excessive resource consumption (CVE-2022-41725)\n\n* golang.org/x/net/html: Cross site scripting (CVE-2023-3978)\n\n* golang: net/http, net/textproto: denial of service from excessive memory allocation (CVE-2023-24534)\n\n* golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption (CVE-2023-24536)\n\n* golang: go/parser: Infinite loop in parsing (CVE-2023-24537)\n\n* golang: html/template: backticks not treated as string delimiters (CVE-2023-24538)\n\n* golang: html/template: improper sanitization of CSS values (CVE-2023-24539)\n\n* containerd: Supplementary groups are not set up properly (CVE-2023-25173)\n\n* golang: html/template: improper handling of empty HTML attributes (CVE-2023-29400)\n\n* golang: net/http: insufficient sanitization of Host header (CVE-2023-29406)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 9.3 Release Notes linked from the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2023:6474",
        "url": "https://access.redhat.com/errata/RHSA-2023:6474"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.3_release_notes/index",
        "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.3_release_notes/index"
      },
      {
        "category": "external",
        "summary": "2173089",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2173089"
      },
      {
        "category": "external",
        "summary": "2174485",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2174485"
      },
      {
        "category": "external",
        "summary": "2177611",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2177611"
      },
      {
        "category": "external",
        "summary": "2178358",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178358"
      },
      {
        "category": "external",
        "summary": "2178488",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178488"
      },
      {
        "category": "external",
        "summary": "2178492",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178492"
      },
      {
        "category": "external",
        "summary": "2180108",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2180108"
      },
      {
        "category": "external",
        "summary": "2182485",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182485"
      },
      {
        "category": "external",
        "summary": "2182896",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182896"
      },
      {
        "category": "external",
        "summary": "2183597",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2183597"
      },
      {
        "category": "external",
        "summary": "2183975",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2183975"
      },
      {
        "category": "external",
        "summary": "2184481",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2184481"
      },
      {
        "category": "external",
        "summary": "2184482",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2184482"
      },
      {
        "category": "external",
        "summary": "2184483",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2184483"
      },
      {
        "category": "external",
        "summary": "2184484",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2184484"
      },
      {
        "category": "external",
        "summary": "2187187",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187187"
      },
      {
        "category": "external",
        "summary": "2188340",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2188340"
      },
      {
        "category": "external",
        "summary": "2196026",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196026"
      },
      {
        "category": "external",
        "summary": "2196027",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196027"
      },
      {
        "category": "external",
        "summary": "2196029",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196029"
      },
      {
        "category": "external",
        "summary": "2222167",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2222167"
      },
      {
        "category": "external",
        "summary": "2223350",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2223350"
      },
      {
        "category": "external",
        "summary": "2228689",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228689"
      },
      {
        "category": "external",
        "summary": "2229644",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2229644"
      },
      {
        "category": "external",
        "summary": "2230212",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2230212"
      },
      {
        "category": "external",
        "summary": "2231975",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231975"
      },
      {
        "category": "external",
        "summary": "2232308",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2232308"
      },
      {
        "category": "external",
        "summary": "2233222",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2233222"
      },
      {
        "category": "external",
        "summary": "RHEL-3132",
        "url": "https://issues.redhat.com/browse/RHEL-3132"
      },
      {
        "category": "external",
        "summary": "RHEL-3133",
        "url": "https://issues.redhat.com/browse/RHEL-3133"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_6474.json"
      }
    ],
    "title": "Red Hat Security Advisory: podman security, bug fix, and enhancement update",
    "tracking": {
      "current_release_date": "2024-11-14T00:14:36+00:00",
      "generator": {
        "date": "2024-11-14T00:14:36+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.0"
        }
      },
      "id": "RHSA-2023:6474",
      "initial_release_date": "2023-11-07T08:52:01+00:00",
      "revision_history": [
        {
          "date": "2023-11-07T08:52:01+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2023-11-07T08:52:01+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-14T00:14:36+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                  "product_id": "AppStream-9.3.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "podman-2:4.6.1-5.el9.src",
                "product": {
                  "name": "podman-2:4.6.1-5.el9.src",
                  "product_id": "podman-2:4.6.1-5.el9.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/podman@4.6.1-5.el9?arch=src\u0026epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "podman-2:4.6.1-5.el9.aarch64",
                "product": {
                  "name": "podman-2:4.6.1-5.el9.aarch64",
                  "product_id": "podman-2:4.6.1-5.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/podman@4.6.1-5.el9?arch=aarch64\u0026epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "podman-gvproxy-2:4.6.1-5.el9.aarch64",
                "product": {
                  "name": "podman-gvproxy-2:4.6.1-5.el9.aarch64",
                  "product_id": "podman-gvproxy-2:4.6.1-5.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/podman-gvproxy@4.6.1-5.el9?arch=aarch64\u0026epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "podman-plugins-2:4.6.1-5.el9.aarch64",
                "product": {
                  "name": "podman-plugins-2:4.6.1-5.el9.aarch64",
                  "product_id": "podman-plugins-2:4.6.1-5.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/podman-plugins@4.6.1-5.el9?arch=aarch64\u0026epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "podman-remote-2:4.6.1-5.el9.aarch64",
                "product": {
                  "name": "podman-remote-2:4.6.1-5.el9.aarch64",
                  "product_id": "podman-remote-2:4.6.1-5.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/podman-remote@4.6.1-5.el9?arch=aarch64\u0026epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "podman-tests-2:4.6.1-5.el9.aarch64",
                "product": {
                  "name": "podman-tests-2:4.6.1-5.el9.aarch64",
                  "product_id": "podman-tests-2:4.6.1-5.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/podman-tests@4.6.1-5.el9?arch=aarch64\u0026epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "podman-debugsource-2:4.6.1-5.el9.aarch64",
                "product": {
                  "name": "podman-debugsource-2:4.6.1-5.el9.aarch64",
                  "product_id": "podman-debugsource-2:4.6.1-5.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/podman-debugsource@4.6.1-5.el9?arch=aarch64\u0026epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "podman-debuginfo-2:4.6.1-5.el9.aarch64",
                "product": {
                  "name": "podman-debuginfo-2:4.6.1-5.el9.aarch64",
                  "product_id": "podman-debuginfo-2:4.6.1-5.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/podman-debuginfo@4.6.1-5.el9?arch=aarch64\u0026epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "podman-gvproxy-debuginfo-2:4.6.1-5.el9.aarch64",
                "product": {
                  "name": "podman-gvproxy-debuginfo-2:4.6.1-5.el9.aarch64",
                  "product_id": "podman-gvproxy-debuginfo-2:4.6.1-5.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.6.1-5.el9?arch=aarch64\u0026epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "podman-plugins-debuginfo-2:4.6.1-5.el9.aarch64",
                "product": {
                  "name": "podman-plugins-debuginfo-2:4.6.1-5.el9.aarch64",
                  "product_id": "podman-plugins-debuginfo-2:4.6.1-5.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.6.1-5.el9?arch=aarch64\u0026epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "podman-remote-debuginfo-2:4.6.1-5.el9.aarch64",
                "product": {
                  "name": "podman-remote-debuginfo-2:4.6.1-5.el9.aarch64",
                  "product_id": "podman-remote-debuginfo-2:4.6.1-5.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.6.1-5.el9?arch=aarch64\u0026epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "podman-2:4.6.1-5.el9.ppc64le",
                "product": {
                  "name": "podman-2:4.6.1-5.el9.ppc64le",
                  "product_id": "podman-2:4.6.1-5.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/podman@4.6.1-5.el9?arch=ppc64le\u0026epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "podman-gvproxy-2:4.6.1-5.el9.ppc64le",
                "product": {
                  "name": "podman-gvproxy-2:4.6.1-5.el9.ppc64le",
                  "product_id": "podman-gvproxy-2:4.6.1-5.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/podman-gvproxy@4.6.1-5.el9?arch=ppc64le\u0026epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "podman-plugins-2:4.6.1-5.el9.ppc64le",
                "product": {
                  "name": "podman-plugins-2:4.6.1-5.el9.ppc64le",
                  "product_id": "podman-plugins-2:4.6.1-5.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/podman-plugins@4.6.1-5.el9?arch=ppc64le\u0026epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "podman-remote-2:4.6.1-5.el9.ppc64le",
                "product": {
                  "name": "podman-remote-2:4.6.1-5.el9.ppc64le",
                  "product_id": "podman-remote-2:4.6.1-5.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/podman-remote@4.6.1-5.el9?arch=ppc64le\u0026epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "podman-tests-2:4.6.1-5.el9.ppc64le",
                "product": {
                  "name": "podman-tests-2:4.6.1-5.el9.ppc64le",
                  "product_id": "podman-tests-2:4.6.1-5.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/podman-tests@4.6.1-5.el9?arch=ppc64le\u0026epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "podman-debugsource-2:4.6.1-5.el9.ppc64le",
                "product": {
                  "name": "podman-debugsource-2:4.6.1-5.el9.ppc64le",
                  "product_id": "podman-debugsource-2:4.6.1-5.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/podman-debugsource@4.6.1-5.el9?arch=ppc64le\u0026epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "podman-debuginfo-2:4.6.1-5.el9.ppc64le",
                "product": {
                  "name": "podman-debuginfo-2:4.6.1-5.el9.ppc64le",
                  "product_id": "podman-debuginfo-2:4.6.1-5.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/podman-debuginfo@4.6.1-5.el9?arch=ppc64le\u0026epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "podman-gvproxy-debuginfo-2:4.6.1-5.el9.ppc64le",
                "product": {
                  "name": "podman-gvproxy-debuginfo-2:4.6.1-5.el9.ppc64le",
                  "product_id": "podman-gvproxy-debuginfo-2:4.6.1-5.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.6.1-5.el9?arch=ppc64le\u0026epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "podman-plugins-debuginfo-2:4.6.1-5.el9.ppc64le",
                "product": {
                  "name": "podman-plugins-debuginfo-2:4.6.1-5.el9.ppc64le",
                  "product_id": "podman-plugins-debuginfo-2:4.6.1-5.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.6.1-5.el9?arch=ppc64le\u0026epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "podman-remote-debuginfo-2:4.6.1-5.el9.ppc64le",
                "product": {
                  "name": "podman-remote-debuginfo-2:4.6.1-5.el9.ppc64le",
                  "product_id": "podman-remote-debuginfo-2:4.6.1-5.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.6.1-5.el9?arch=ppc64le\u0026epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "podman-2:4.6.1-5.el9.x86_64",
                "product": {
                  "name": "podman-2:4.6.1-5.el9.x86_64",
                  "product_id": "podman-2:4.6.1-5.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/podman@4.6.1-5.el9?arch=x86_64\u0026epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "podman-gvproxy-2:4.6.1-5.el9.x86_64",
                "product": {
                  "name": "podman-gvproxy-2:4.6.1-5.el9.x86_64",
                  "product_id": "podman-gvproxy-2:4.6.1-5.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/podman-gvproxy@4.6.1-5.el9?arch=x86_64\u0026epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "podman-plugins-2:4.6.1-5.el9.x86_64",
                "product": {
                  "name": "podman-plugins-2:4.6.1-5.el9.x86_64",
                  "product_id": "podman-plugins-2:4.6.1-5.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/podman-plugins@4.6.1-5.el9?arch=x86_64\u0026epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "podman-remote-2:4.6.1-5.el9.x86_64",
                "product": {
                  "name": "podman-remote-2:4.6.1-5.el9.x86_64",
                  "product_id": "podman-remote-2:4.6.1-5.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/podman-remote@4.6.1-5.el9?arch=x86_64\u0026epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "podman-tests-2:4.6.1-5.el9.x86_64",
                "product": {
                  "name": "podman-tests-2:4.6.1-5.el9.x86_64",
                  "product_id": "podman-tests-2:4.6.1-5.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/podman-tests@4.6.1-5.el9?arch=x86_64\u0026epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "podman-debugsource-2:4.6.1-5.el9.x86_64",
                "product": {
                  "name": "podman-debugsource-2:4.6.1-5.el9.x86_64",
                  "product_id": "podman-debugsource-2:4.6.1-5.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/podman-debugsource@4.6.1-5.el9?arch=x86_64\u0026epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "podman-debuginfo-2:4.6.1-5.el9.x86_64",
                "product": {
                  "name": "podman-debuginfo-2:4.6.1-5.el9.x86_64",
                  "product_id": "podman-debuginfo-2:4.6.1-5.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/podman-debuginfo@4.6.1-5.el9?arch=x86_64\u0026epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "podman-gvproxy-debuginfo-2:4.6.1-5.el9.x86_64",
                "product": {
                  "name": "podman-gvproxy-debuginfo-2:4.6.1-5.el9.x86_64",
                  "product_id": "podman-gvproxy-debuginfo-2:4.6.1-5.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.6.1-5.el9?arch=x86_64\u0026epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "podman-plugins-debuginfo-2:4.6.1-5.el9.x86_64",
                "product": {
                  "name": "podman-plugins-debuginfo-2:4.6.1-5.el9.x86_64",
                  "product_id": "podman-plugins-debuginfo-2:4.6.1-5.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.6.1-5.el9?arch=x86_64\u0026epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "podman-remote-debuginfo-2:4.6.1-5.el9.x86_64",
                "product": {
                  "name": "podman-remote-debuginfo-2:4.6.1-5.el9.x86_64",
                  "product_id": "podman-remote-debuginfo-2:4.6.1-5.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.6.1-5.el9?arch=x86_64\u0026epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "podman-2:4.6.1-5.el9.s390x",
                "product": {
                  "name": "podman-2:4.6.1-5.el9.s390x",
                  "product_id": "podman-2:4.6.1-5.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/podman@4.6.1-5.el9?arch=s390x\u0026epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "podman-gvproxy-2:4.6.1-5.el9.s390x",
                "product": {
                  "name": "podman-gvproxy-2:4.6.1-5.el9.s390x",
                  "product_id": "podman-gvproxy-2:4.6.1-5.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/podman-gvproxy@4.6.1-5.el9?arch=s390x\u0026epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "podman-plugins-2:4.6.1-5.el9.s390x",
                "product": {
                  "name": "podman-plugins-2:4.6.1-5.el9.s390x",
                  "product_id": "podman-plugins-2:4.6.1-5.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/podman-plugins@4.6.1-5.el9?arch=s390x\u0026epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "podman-remote-2:4.6.1-5.el9.s390x",
                "product": {
                  "name": "podman-remote-2:4.6.1-5.el9.s390x",
                  "product_id": "podman-remote-2:4.6.1-5.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/podman-remote@4.6.1-5.el9?arch=s390x\u0026epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "podman-tests-2:4.6.1-5.el9.s390x",
                "product": {
                  "name": "podman-tests-2:4.6.1-5.el9.s390x",
                  "product_id": "podman-tests-2:4.6.1-5.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/podman-tests@4.6.1-5.el9?arch=s390x\u0026epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "podman-debugsource-2:4.6.1-5.el9.s390x",
                "product": {
                  "name": "podman-debugsource-2:4.6.1-5.el9.s390x",
                  "product_id": "podman-debugsource-2:4.6.1-5.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/podman-debugsource@4.6.1-5.el9?arch=s390x\u0026epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "podman-debuginfo-2:4.6.1-5.el9.s390x",
                "product": {
                  "name": "podman-debuginfo-2:4.6.1-5.el9.s390x",
                  "product_id": "podman-debuginfo-2:4.6.1-5.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/podman-debuginfo@4.6.1-5.el9?arch=s390x\u0026epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "podman-gvproxy-debuginfo-2:4.6.1-5.el9.s390x",
                "product": {
                  "name": "podman-gvproxy-debuginfo-2:4.6.1-5.el9.s390x",
                  "product_id": "podman-gvproxy-debuginfo-2:4.6.1-5.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.6.1-5.el9?arch=s390x\u0026epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "podman-plugins-debuginfo-2:4.6.1-5.el9.s390x",
                "product": {
                  "name": "podman-plugins-debuginfo-2:4.6.1-5.el9.s390x",
                  "product_id": "podman-plugins-debuginfo-2:4.6.1-5.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.6.1-5.el9?arch=s390x\u0026epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "podman-remote-debuginfo-2:4.6.1-5.el9.s390x",
                "product": {
                  "name": "podman-remote-debuginfo-2:4.6.1-5.el9.s390x",
                  "product_id": "podman-remote-debuginfo-2:4.6.1-5.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.6.1-5.el9?arch=s390x\u0026epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "podman-docker-2:4.6.1-5.el9.noarch",
                "product": {
                  "name": "podman-docker-2:4.6.1-5.el9.noarch",
                  "product_id": "podman-docker-2:4.6.1-5.el9.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/podman-docker@4.6.1-5.el9?arch=noarch\u0026epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "podman-2:4.6.1-5.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.aarch64"
        },
        "product_reference": "podman-2:4.6.1-5.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "podman-2:4.6.1-5.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.ppc64le"
        },
        "product_reference": "podman-2:4.6.1-5.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "podman-2:4.6.1-5.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.s390x"
        },
        "product_reference": "podman-2:4.6.1-5.el9.s390x",
        "relates_to_product_reference": "AppStream-9.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "podman-2:4.6.1-5.el9.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.src"
        },
        "product_reference": "podman-2:4.6.1-5.el9.src",
        "relates_to_product_reference": "AppStream-9.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "podman-2:4.6.1-5.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.x86_64"
        },
        "product_reference": "podman-2:4.6.1-5.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "podman-debuginfo-2:4.6.1-5.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.aarch64"
        },
        "product_reference": "podman-debuginfo-2:4.6.1-5.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "podman-debuginfo-2:4.6.1-5.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.ppc64le"
        },
        "product_reference": "podman-debuginfo-2:4.6.1-5.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "podman-debuginfo-2:4.6.1-5.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.s390x"
        },
        "product_reference": "podman-debuginfo-2:4.6.1-5.el9.s390x",
        "relates_to_product_reference": "AppStream-9.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "podman-debuginfo-2:4.6.1-5.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.x86_64"
        },
        "product_reference": "podman-debuginfo-2:4.6.1-5.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "podman-debugsource-2:4.6.1-5.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.aarch64"
        },
        "product_reference": "podman-debugsource-2:4.6.1-5.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "podman-debugsource-2:4.6.1-5.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.ppc64le"
        },
        "product_reference": "podman-debugsource-2:4.6.1-5.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "podman-debugsource-2:4.6.1-5.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.s390x"
        },
        "product_reference": "podman-debugsource-2:4.6.1-5.el9.s390x",
        "relates_to_product_reference": "AppStream-9.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "podman-debugsource-2:4.6.1-5.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.x86_64"
        },
        "product_reference": "podman-debugsource-2:4.6.1-5.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "podman-docker-2:4.6.1-5.el9.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.3.0.GA:podman-docker-2:4.6.1-5.el9.noarch"
        },
        "product_reference": "podman-docker-2:4.6.1-5.el9.noarch",
        "relates_to_product_reference": "AppStream-9.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "podman-gvproxy-2:4.6.1-5.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.aarch64"
        },
        "product_reference": "podman-gvproxy-2:4.6.1-5.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "podman-gvproxy-2:4.6.1-5.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.ppc64le"
        },
        "product_reference": "podman-gvproxy-2:4.6.1-5.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "podman-gvproxy-2:4.6.1-5.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.s390x"
        },
        "product_reference": "podman-gvproxy-2:4.6.1-5.el9.s390x",
        "relates_to_product_reference": "AppStream-9.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "podman-gvproxy-2:4.6.1-5.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.x86_64"
        },
        "product_reference": "podman-gvproxy-2:4.6.1-5.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "podman-gvproxy-debuginfo-2:4.6.1-5.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.aarch64"
        },
        "product_reference": "podman-gvproxy-debuginfo-2:4.6.1-5.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "podman-gvproxy-debuginfo-2:4.6.1-5.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.ppc64le"
        },
        "product_reference": "podman-gvproxy-debuginfo-2:4.6.1-5.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "podman-gvproxy-debuginfo-2:4.6.1-5.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.s390x"
        },
        "product_reference": "podman-gvproxy-debuginfo-2:4.6.1-5.el9.s390x",
        "relates_to_product_reference": "AppStream-9.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "podman-gvproxy-debuginfo-2:4.6.1-5.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.x86_64"
        },
        "product_reference": "podman-gvproxy-debuginfo-2:4.6.1-5.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "podman-plugins-2:4.6.1-5.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.aarch64"
        },
        "product_reference": "podman-plugins-2:4.6.1-5.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "podman-plugins-2:4.6.1-5.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.ppc64le"
        },
        "product_reference": "podman-plugins-2:4.6.1-5.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "podman-plugins-2:4.6.1-5.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.s390x"
        },
        "product_reference": "podman-plugins-2:4.6.1-5.el9.s390x",
        "relates_to_product_reference": "AppStream-9.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "podman-plugins-2:4.6.1-5.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.x86_64"
        },
        "product_reference": "podman-plugins-2:4.6.1-5.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "podman-plugins-debuginfo-2:4.6.1-5.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.aarch64"
        },
        "product_reference": "podman-plugins-debuginfo-2:4.6.1-5.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "podman-plugins-debuginfo-2:4.6.1-5.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.ppc64le"
        },
        "product_reference": "podman-plugins-debuginfo-2:4.6.1-5.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "podman-plugins-debuginfo-2:4.6.1-5.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.s390x"
        },
        "product_reference": "podman-plugins-debuginfo-2:4.6.1-5.el9.s390x",
        "relates_to_product_reference": "AppStream-9.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "podman-plugins-debuginfo-2:4.6.1-5.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.x86_64"
        },
        "product_reference": "podman-plugins-debuginfo-2:4.6.1-5.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "podman-remote-2:4.6.1-5.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.aarch64"
        },
        "product_reference": "podman-remote-2:4.6.1-5.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "podman-remote-2:4.6.1-5.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.ppc64le"
        },
        "product_reference": "podman-remote-2:4.6.1-5.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "podman-remote-2:4.6.1-5.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.s390x"
        },
        "product_reference": "podman-remote-2:4.6.1-5.el9.s390x",
        "relates_to_product_reference": "AppStream-9.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "podman-remote-2:4.6.1-5.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.x86_64"
        },
        "product_reference": "podman-remote-2:4.6.1-5.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "podman-remote-debuginfo-2:4.6.1-5.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.aarch64"
        },
        "product_reference": "podman-remote-debuginfo-2:4.6.1-5.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "podman-remote-debuginfo-2:4.6.1-5.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.ppc64le"
        },
        "product_reference": "podman-remote-debuginfo-2:4.6.1-5.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "podman-remote-debuginfo-2:4.6.1-5.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.s390x"
        },
        "product_reference": "podman-remote-debuginfo-2:4.6.1-5.el9.s390x",
        "relates_to_product_reference": "AppStream-9.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "podman-remote-debuginfo-2:4.6.1-5.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.x86_64"
        },
        "product_reference": "podman-remote-debuginfo-2:4.6.1-5.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "podman-tests-2:4.6.1-5.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.aarch64"
        },
        "product_reference": "podman-tests-2:4.6.1-5.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "podman-tests-2:4.6.1-5.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.ppc64le"
        },
        "product_reference": "podman-tests-2:4.6.1-5.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "podman-tests-2:4.6.1-5.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.s390x"
        },
        "product_reference": "podman-tests-2:4.6.1-5.el9.s390x",
        "relates_to_product_reference": "AppStream-9.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "podman-tests-2:4.6.1-5.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.x86_64"
        },
        "product_reference": "podman-tests-2:4.6.1-5.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.3.0.GA"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Philippe Antoine"
          ],
          "organization": "Catena Cyber"
        }
      ],
      "cve": "CVE-2022-41723",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2023-03-14T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2178358"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of requests.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Within OpenShift Container Platform, the maximum impact of this vulnerability is a denial of service against an individual container so the impact could not cascade across the entire infrastructure, this vulnerability is rated Moderate impact.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.src",
          "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-docker-2:4.6.1-5.el9.noarch",
          "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-41723"
        },
        {
          "category": "external",
          "summary": "RHBZ#2178358",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178358"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-41723",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41723",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41723"
        },
        {
          "category": "external",
          "summary": "https://github.com/advisories/GHSA-vvpx-j8f3-3w6h",
          "url": "https://github.com/advisories/GHSA-vvpx-j8f3-3w6h"
        },
        {
          "category": "external",
          "summary": "https://go.dev/cl/468135",
          "url": "https://go.dev/cl/468135"
        },
        {
          "category": "external",
          "summary": "https://go.dev/cl/468295",
          "url": "https://go.dev/cl/468295"
        },
        {
          "category": "external",
          "summary": "https://go.dev/issue/57855",
          "url": "https://go.dev/issue/57855"
        },
        {
          "category": "external",
          "summary": "https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E",
          "url": "https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E"
        },
        {
          "category": "external",
          "summary": "https://pkg.go.dev/vuln/GO-2023-1571",
          "url": "https://pkg.go.dev/vuln/GO-2023-1571"
        },
        {
          "category": "external",
          "summary": "https://vuln.go.dev/ID/GO-2023-1571.json",
          "url": "https://vuln.go.dev/ID/GO-2023-1571.json"
        }
      ],
      "release_date": "2023-02-17T14:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-11-07T08:52:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.src",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-docker-2:4.6.1-5.el9.noarch",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:6474"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.src",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-docker-2:4.6.1-5.el9.noarch",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding"
    },
    {
      "cve": "CVE-2022-41724",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2023-03-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2178492"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker can cause a denial of service condition.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "golang: crypto/tls: large handshake records may cause panics",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The opportunity for a denial of service is limited to the golang runtime. In the case of the OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.src",
          "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-docker-2:4.6.1-5.el9.noarch",
          "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-41724"
        },
        {
          "category": "external",
          "summary": "RHBZ#2178492",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178492"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-41724",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41724",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41724"
        },
        {
          "category": "external",
          "summary": "https://go.dev/cl/468125",
          "url": "https://go.dev/cl/468125"
        },
        {
          "category": "external",
          "summary": "https://go.dev/issue/58001",
          "url": "https://go.dev/issue/58001"
        },
        {
          "category": "external",
          "summary": "https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E",
          "url": "https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E"
        },
        {
          "category": "external",
          "summary": "https://pkg.go.dev/vuln/GO-2023-1570",
          "url": "https://pkg.go.dev/vuln/GO-2023-1570"
        }
      ],
      "release_date": "2023-02-15T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-11-07T08:52:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.src",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-docker-2:4.6.1-5.el9.noarch",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:6474"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.src",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-docker-2:4.6.1-5.el9.noarch",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "golang: crypto/tls: large handshake records may cause panics"
    },
    {
      "cve": "CVE-2022-41725",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2023-03-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2178488"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Go, where it is vulnerable to a denial of service caused by an excessive resource consumption flaw in the net/http and mime/multipart packages. By sending a specially-crafted request, a remote attacker can cause a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "golang: net/http, mime/multipart: denial of service from excessive resource consumption",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The opportunity for a Denial of Service is limited to the golang runtime. In the case of the OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.src",
          "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-docker-2:4.6.1-5.el9.noarch",
          "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-41725"
        },
        {
          "category": "external",
          "summary": "RHBZ#2178488",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178488"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-41725",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41725",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41725"
        },
        {
          "category": "external",
          "summary": "https://go.dev/cl/468124",
          "url": "https://go.dev/cl/468124"
        },
        {
          "category": "external",
          "summary": "https://go.dev/issue/58006",
          "url": "https://go.dev/issue/58006"
        },
        {
          "category": "external",
          "summary": "https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E",
          "url": "https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E"
        },
        {
          "category": "external",
          "summary": "https://pkg.go.dev/vuln/GO-2023-1569",
          "url": "https://pkg.go.dev/vuln/GO-2023-1569"
        }
      ],
      "release_date": "2023-02-15T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-11-07T08:52:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.src",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-docker-2:4.6.1-5.el9.noarch",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:6474"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.src",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-docker-2:4.6.1-5.el9.noarch",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "golang: net/http, mime/multipart: denial of service from excessive resource consumption"
    },
    {
      "cve": "CVE-2023-3978",
      "cwe": {
        "id": "CWE-79",
        "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
      },
      "discovery_date": "2023-08-03T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2228689"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Golang HTML package where it is vulnerable to Cross-site scripting caused by the improper validation of user-supplied input. A remote attacker could exploit this vulnerability using a specially crafted URL to execute a script in a victim\u0027s web browser within the security context of the hosting website once the URL is clicked. The flaw allows an attacker to steal the victim\u0027s cookie-based authentication credentials.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "golang.org/x/net/html: Cross site scripting",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.src",
          "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-docker-2:4.6.1-5.el9.noarch",
          "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-3978"
        },
        {
          "category": "external",
          "summary": "RHBZ#2228689",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228689"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-3978",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-3978",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-3978"
        },
        {
          "category": "external",
          "summary": "https://go.dev/cl/514896",
          "url": "https://go.dev/cl/514896"
        },
        {
          "category": "external",
          "summary": "https://go.dev/issue/61615",
          "url": "https://go.dev/issue/61615"
        },
        {
          "category": "external",
          "summary": "https://pkg.go.dev/vuln/GO-2023-1988",
          "url": "https://pkg.go.dev/vuln/GO-2023-1988"
        }
      ],
      "release_date": "2023-08-02T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-11-07T08:52:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.src",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-docker-2:4.6.1-5.el9.noarch",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:6474"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.src",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-docker-2:4.6.1-5.el9.noarch",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "golang.org/x/net/html: Cross site scripting"
    },
    {
      "cve": "CVE-2023-24534",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2023-04-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2184483"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by memory exhaustion in the common function in HTTP and MIME header parsing. By sending a specially crafted request, a remote attacker can cause a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "golang: net/http, net/textproto: denial of service from excessive memory allocation",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.src",
          "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-docker-2:4.6.1-5.el9.noarch",
          "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-24534"
        },
        {
          "category": "external",
          "summary": "RHBZ#2184483",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2184483"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-24534",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-24534",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-24534"
        },
        {
          "category": "external",
          "summary": "https://go.dev/issue/58975",
          "url": "https://go.dev/issue/58975"
        },
        {
          "category": "external",
          "summary": "https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8",
          "url": "https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8"
        }
      ],
      "release_date": "2023-04-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-11-07T08:52:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.src",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-docker-2:4.6.1-5.el9.noarch",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:6474"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.src",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-docker-2:4.6.1-5.el9.noarch",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "golang: net/http, net/textproto: denial of service from excessive memory allocation"
    },
    {
      "cve": "CVE-2023-24536",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2023-04-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2184482"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by an issue during multipart form parsing. By sending a specially crafted input, a remote attacker can consume large amounts of CPU and memory, resulting in a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "For Red Hat Enterprise Linux,\n\n* Conmon uses Go in unit testing, but not functionally in the package. Go is used only in test files, hence, not in the actual code, thus, conmon is not-affected.\n* The CVE refers to multipart form parsing routine mime/multipart.Reader.ReadForm, which is not used in Grafana, hence it is not-affected.\n* Butane does not parse multipart forms, hence, it is also not-affected.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.src",
          "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-docker-2:4.6.1-5.el9.noarch",
          "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-24536"
        },
        {
          "category": "external",
          "summary": "RHBZ#2184482",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2184482"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-24536",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-24536",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-24536"
        },
        {
          "category": "external",
          "summary": "https://go.dev/issue/59153",
          "url": "https://go.dev/issue/59153"
        },
        {
          "category": "external",
          "summary": "https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8",
          "url": "https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8"
        }
      ],
      "release_date": "2023-04-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-11-07T08:52:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.src",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-docker-2:4.6.1-5.el9.noarch",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:6474"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.src",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-docker-2:4.6.1-5.el9.noarch",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption"
    },
    {
      "cve": "CVE-2023-24537",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
      },
      "discovery_date": "2023-04-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2184484"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by an infinite loop due to integer overflow when calling any of the Parse functions. By sending a specially crafted input, a remote attacker can cause a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "golang: go/parser: Infinite loop in parsing",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.src",
          "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-docker-2:4.6.1-5.el9.noarch",
          "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-24537"
        },
        {
          "category": "external",
          "summary": "RHBZ#2184484",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2184484"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-24537",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-24537",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-24537"
        },
        {
          "category": "external",
          "summary": "https://github.com/golang/go/issues/59180",
          "url": "https://github.com/golang/go/issues/59180"
        },
        {
          "category": "external",
          "summary": "https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8",
          "url": "https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8"
        }
      ],
      "release_date": "2023-04-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-11-07T08:52:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.src",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-docker-2:4.6.1-5.el9.noarch",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:6474"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.src",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-docker-2:4.6.1-5.el9.noarch",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "golang: go/parser: Infinite loop in parsing"
    },
    {
      "cve": "CVE-2023-24538",
      "cwe": {
        "id": "CWE-94",
        "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
      },
      "discovery_date": "2023-04-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2184481"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Golang Go. This flaw allows a remote attacker to execute arbitrary code on the system, caused by not properly considering backticks (`) as Javascript string delimiters. By sending a specially crafted request, an attacker execute arbitrary code on the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "golang: html/template: backticks not treated as string delimiters",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The described issue involving Go templates and JavaScript template literals poses a moderate severity rather than an important one due to several mitigating factors. Firstly, the vulnerability requires specific conditions to be met: the presence of Go templates within JavaScript template literals. This limits the scope of affected codebases, reducing the likelihood of exploitation. Additionally, the decision to disallow such interactions in future releases of Go indicates a proactive approach to addressing the issue. Furthermore, the affected packages or components within Red Hat Enterprise Linux, such as Conmon, Grafana, and the RHC package, have been assessed and determined not to be impacted due to their specific usage patterns. So the limited scope of affected systems and the absence of exploitation vectors in specific components within Red Hat Enterprise Linux contribute to categorizing the severity of the issue as moderate.\n\nFor Red Hat Enterprise Linux,\n\n* Conmon uses go in unit testing, but not functionally in the package. Go is used only in test files, hence, not in the actual code, thus, conmon is not affected.\n* The Go templates in Grafana do not contain any javascript. Thus, it is not affected.\n* The rhc package do not make use of html/template. Hence, it is also not affected.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.src",
          "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-docker-2:4.6.1-5.el9.noarch",
          "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-24538"
        },
        {
          "category": "external",
          "summary": "RHBZ#2184481",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2184481"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-24538",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-24538",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-24538"
        },
        {
          "category": "external",
          "summary": "https://github.com/golang/go/issues/59234",
          "url": "https://github.com/golang/go/issues/59234"
        },
        {
          "category": "external",
          "summary": "https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8",
          "url": "https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8"
        }
      ],
      "release_date": "2023-04-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-11-07T08:52:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.src",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-docker-2:4.6.1-5.el9.noarch",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:6474"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.src",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-docker-2:4.6.1-5.el9.noarch",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.src",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-docker-2:4.6.1-5.el9.noarch",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "golang: html/template: backticks not treated as string delimiters"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Juho Nurminen"
          ],
          "organization": "Mattermost"
        }
      ],
      "cve": "CVE-2023-24539",
      "cwe": {
        "id": "CWE-176",
        "name": "Improper Handling of Unicode Encoding"
      },
      "discovery_date": "2023-05-07T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2196026"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in golang where angle brackets (\u003c\u003e) were not considered dangerous characters when inserted into CSS contexts. Templates containing multiple actions separated by a \u0027/\u0027 character could result in the CSS context unexpectedly closing, allowing for the injection of unexpected HMTL if executed with untrusted input.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "golang: html/template: improper sanitization of CSS values",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "For Red Hat Enterprise Linux,\n\n* Conmon uses go in unit testing, but not functionally in the package. Go is used only in test files, not in the actual code. Thus, conmon is not affected.\n* The Go templates in Grafana do not contain any javascript. Thus, it is not affected.\n* Ignition does not make use of html/template.\n\nIn Red Hat Advanced Cluster Management for Kubernetes (RHACM), the affected containers are behind OpenShift OAuth authentication. This restricts access to the vulnerable golang html/templates to authenticated users only, therefore, the impact is low.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.src",
          "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-docker-2:4.6.1-5.el9.noarch",
          "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-24539"
        },
        {
          "category": "external",
          "summary": "RHBZ#2196026",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196026"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-24539",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-24539",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-24539"
        },
        {
          "category": "external",
          "summary": "https://github.com/golang/go/issues/59720",
          "url": "https://github.com/golang/go/issues/59720"
        },
        {
          "category": "external",
          "summary": "https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU",
          "url": "https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU"
        }
      ],
      "release_date": "2023-04-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-11-07T08:52:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.src",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-docker-2:4.6.1-5.el9.noarch",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:6474"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
          "product_ids": [
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.src",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-docker-2:4.6.1-5.el9.noarch",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.src",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-docker-2:4.6.1-5.el9.noarch",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "golang: html/template: improper sanitization of CSS values"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Juho Nurminen"
          ],
          "organization": "Mattermost"
        }
      ],
      "cve": "CVE-2023-24540",
      "cwe": {
        "id": "CWE-176",
        "name": "Improper Handling of Unicode Encoding"
      },
      "discovery_date": "2023-05-07T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2196027"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in golang, where not all valid JavaScript white-space characters were considered white space. Due to this issue, templates containing white-space characters outside of the character set \"\\t\\n\\f\\r\\u0020\\u2028\\u2029\" in JavaScript contexts that also contain actions may not be properly sanitized during execution.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "golang: html/template: improper handling of JavaScript whitespace",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "For Red Hat Enterprise Linux,\n* Conmon uses go in unit testing, but not functionally in the package. Go is used only in test files, hence, not in the actual code, thus, conmon is not affected.\n* The Go templates in Grafana do not contain any javascript. Thus, it is not affected.\n* Ignition does not make use of html/template.\n\nIn Red Hat Advanced Cluster Management for Kubernetes (RHACM) the affected containers are behind OpenShift OAuth authentication. This restricts access to the vulnerable golang html/templates to authenticated users only, therefore the impact is low.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.src",
          "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-docker-2:4.6.1-5.el9.noarch",
          "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-24540"
        },
        {
          "category": "external",
          "summary": "RHBZ#2196027",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196027"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-24540",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-24540",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-24540"
        },
        {
          "category": "external",
          "summary": "https://go.dev/issue/59721",
          "url": "https://go.dev/issue/59721"
        },
        {
          "category": "external",
          "summary": "https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU",
          "url": "https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU"
        }
      ],
      "release_date": "2023-04-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-11-07T08:52:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.src",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-docker-2:4.6.1-5.el9.noarch",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:6474"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
          "product_ids": [
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.src",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-docker-2:4.6.1-5.el9.noarch",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.src",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-docker-2:4.6.1-5.el9.noarch",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "golang: html/template: improper handling of JavaScript whitespace"
    },
    {
      "cve": "CVE-2023-25173",
      "cwe": {
        "id": "CWE-842",
        "name": "Placement of User into Incorrect Group"
      },
      "discovery_date": "2023-03-01T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2174485"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in containerd, where supplementary groups are not set up properly inside a container. If an attacker has direct access to a container and manipulates their supplementary group access, they may be able to use supplementary group access to bypass primary group restrictions in some cases. This issue can allow access to sensitive information or gain the ability to execute code in that container.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "containerd: Supplementary groups are not set up properly",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The following products include containerd related code, but do not use the specific Go packages impacted by this CVE, `containerd/cri/server` and `containerd/oci`. This CVE is therefore rated Low for these products:\n\n* OpenShift Container Platform\n* OpenShift Service Mesh\n* OpenShift API for Data Protection\n* Red Hat Advanced Cluster Security\n* Red Hat Advanced Cluster Management for Kubernetes",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.src",
          "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-docker-2:4.6.1-5.el9.noarch",
          "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-25173"
        },
        {
          "category": "external",
          "summary": "RHBZ#2174485",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2174485"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-25173",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-25173"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-25173",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-25173"
        },
        {
          "category": "external",
          "summary": "https://github.com/containerd/containerd/commit/133f6bb6cd827ce35a5fb279c1ead12b9d21460a",
          "url": "https://github.com/containerd/containerd/commit/133f6bb6cd827ce35a5fb279c1ead12b9d21460a"
        },
        {
          "category": "external",
          "summary": "https://github.com/containerd/containerd/releases/tag/v1.5.18",
          "url": "https://github.com/containerd/containerd/releases/tag/v1.5.18"
        },
        {
          "category": "external",
          "summary": "https://github.com/containerd/containerd/releases/tag/v1.6.18",
          "url": "https://github.com/containerd/containerd/releases/tag/v1.6.18"
        },
        {
          "category": "external",
          "summary": "https://github.com/containerd/containerd/security/advisories/GHSA-hmfx-3pcx-653p",
          "url": "https://github.com/containerd/containerd/security/advisories/GHSA-hmfx-3pcx-653p"
        },
        {
          "category": "external",
          "summary": "https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/",
          "url": "https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/"
        }
      ],
      "release_date": "2023-02-15T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-11-07T08:52:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.src",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-docker-2:4.6.1-5.el9.noarch",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:6474"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.src",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-docker-2:4.6.1-5.el9.noarch",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "containerd: Supplementary groups are not set up properly"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Juho Nurminen"
          ],
          "organization": "Mattermost"
        }
      ],
      "cve": "CVE-2023-29400",
      "cwe": {
        "id": "CWE-176",
        "name": "Improper Handling of Unicode Encoding"
      },
      "discovery_date": "2023-05-07T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2196029"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in golang. Templates containing actions in unquoted HTML attributes, for example, \"attr={{.}}\") executed with empty input, could result in output that has unexpected results when parsed due to HTML normalization rules. This issue may allow the injection of arbitrary attributes into tags.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "golang: html/template: improper handling of empty HTML attributes",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "For Red Hat Enterprise Linux,\n\n* Conmon uses go in unit testing, but not functionally in the package. Go is used only in test files, not in the actual code. Thus, conmon is not affected.\n* The Go templates in Grafana do not contain any javascript. Thus, it is not affected.\n* Ignition does not make use of html/template.\n\nIn OpenShift Container Platform and Red Hat Advanced Cluster Management for Kubernetes (RHACM), the affected containers are behind OAuth authentication. This restricts access to the vulnerable golang html/templates to authenticated users, reducing the impact to low.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.src",
          "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-docker-2:4.6.1-5.el9.noarch",
          "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-29400"
        },
        {
          "category": "external",
          "summary": "RHBZ#2196029",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196029"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-29400",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-29400",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-29400"
        },
        {
          "category": "external",
          "summary": "https://go.dev/issue/59722",
          "url": "https://go.dev/issue/59722"
        },
        {
          "category": "external",
          "summary": "https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU",
          "url": "https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU"
        }
      ],
      "release_date": "2023-04-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-11-07T08:52:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.src",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-docker-2:4.6.1-5.el9.noarch",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:6474"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
          "product_ids": [
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.src",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-docker-2:4.6.1-5.el9.noarch",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.src",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-docker-2:4.6.1-5.el9.noarch",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "golang: html/template: improper handling of empty HTML attributes"
    },
    {
      "cve": "CVE-2023-29406",
      "cwe": {
        "id": "CWE-113",
        "name": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)"
      },
      "discovery_date": "2023-07-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2222167"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Golang, where it is vulnerable to HTTP header injection caused by improper content validation of the Host header by the HTTP/1 client. A remote attacker can inject arbitrary HTTP headers by persuading a victim to visit a specially crafted Web page. This flaw allows the attacker to conduct various attacks against the vulnerable system, including Cross-site scripting, cache poisoning, or session hijacking.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "golang: net/http: insufficient sanitization of Host header",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.src",
          "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-docker-2:4.6.1-5.el9.noarch",
          "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.x86_64",
          "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.aarch64",
          "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.ppc64le",
          "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.s390x",
          "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-29406"
        },
        {
          "category": "external",
          "summary": "RHBZ#2222167",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2222167"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-29406",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-29406",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-29406"
        },
        {
          "category": "external",
          "summary": "https://groups.google.com/g/golang-announce/c/2q13H6LEEx0",
          "url": "https://groups.google.com/g/golang-announce/c/2q13H6LEEx0"
        }
      ],
      "release_date": "2023-07-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-11-07T08:52:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.src",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-docker-2:4.6.1-5.el9.noarch",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2023:6474"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.src",
            "AppStream-9.3.0.GA:podman-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-debugsource-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-docker-2:4.6.1-5.el9.noarch",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-gvproxy-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-gvproxy-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-plugins-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-plugins-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-remote-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-remote-debuginfo-2:4.6.1-5.el9.x86_64",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.aarch64",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.ppc64le",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.s390x",
            "AppStream-9.3.0.GA:podman-tests-2:4.6.1-5.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "golang: net/http: insufficient sanitization of Host header"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.